2025 Call for Papers
Call for Paper
International Conference on
Collaboration in Cybersecurity and Digital Transformation
https://e-cysa.org/conference/
6-7 February 2025
Theme: Cybersecurity, Collaboration, and Project Management
Dates: 6-7 February 2025
Venue: Addis Ababa, Ethiopia – Format: Hybrid
Submission Website: https://digitalcommons.kennesaw.edu/e-cysa/
Conference website: https://e-cysa.org/conference/
Organizer: Ethiopian Cybersecurity Association (ECySA)
Introduction
Digital technology is changing society and human relationships; permeating what we do and bringing digital, physical, and biological systems together. This revolution is marked by emerging technologies including robotics, artificial intelligence, nanotechnology, quantum computing, biotechnology, the Internet of Things, 3D printing, and autonomous vehicles. The impending impact is enormous; it is changing how we live, work, and communicate. It is reshaping our aspect of life.
Technology enables developing economies to leapfrog directly to the information era assisting them to build a knowledge-based economy faster. However, collaboration initiative requires careful planning, executing, and delivering a usable and sustainable solution. It requires a homegrown approach that addresses the country’s unique realities, factoring various cultural, traditional, customs, and country-specific regulatory and legal requirements. It also requires knowledge about transitioning from manual or legacy technology, project management, cybersecurity risk management, and cultural & societal dynamics.
Call for Papers
ECySA seeks to explore the key factors that facilitate the adoption of sustainable digital technology for tangible and sustainable economic outcomes. We invite you to participate by submitting completed or in-progress papers, position papers, panel discussion topics, and exhibition posters in the three conference themes in the context of Cybersecurity: Digital Transformation, Project Management, and Collaboration.
Digital Transformation- Effective technology management is a prerequisite for successful collaboration initiatives. Achieving collaboration goals may become wishful thinking without proper identification and implementation and adaption of implemented technologies. it is essential the project management program adapts to the local cultural norms, political aspects, and social traditions.
Cybersecurity-African countries are sprinting towards digitalization. This quest for digitization may expose the countries to more risk and vulnerability if not complemented with cybersecurity, digital governance, intellectual property (IP) protection, and data privacy protection. Failure to implement these provisions can reduce innovation, make it difficult to scale up digital solutions, and face rapidly evolving complex digital threats against critical infrastructure and state-sponsored organized crime. Countries with inadequate cybersecurity measures have a higher risk of cyberattacks.
Collaboration -Digital transformation is a huge task that needs to mobilize abundant resources and closer institutional, national, and global collaboration. Equally, efforts to secure cyberspace are complex and could hardly be ensured without close collaboration.
The conference will explore diverse stakeholder perspectives from academic, private, government, and non-government institutions. Below are a few suggested topic areas, please do not hesitate to send us papers on other related topics.
Topics in Digital Transformation and Project Management (we welcome other related topics)
- Project management methodologies adapted for local/country use
- Project Governance, risk, and uncertainty performance domain
- Defining, adopting, and promoting sustainability in project and program management.
- Capacity building.
- Policy, standard, disciplined practice for project management
- The management of equality and diversity issues in NGO projects and programs.
- Knowledge transfer and retention in project environments.
- Leveraging local knowledge in projects.
- Establishing effective measures for monitoring and controlling projects
- Use of Project Management Office and Portfolio management practice
- Project leadership in adaptive projects
- Project Management in e-service government projects
- Use of standard project practice in digital technology transformation government projects
- Use of Project Management in overcoming ethical/corruption, social, financial, or technical challenges
- Applications of the Code of Ethics and Professional Conduct in delivering projects
- Role of local universities in Project Management and R&D to improve project success
- University Curriculum and Education in Project Management
- Project stakeholder management including government or aid agency mandates that constrain project success.
- Use of Project results-based accountability
- Use of Measurable Critical success factors in projects
Topics in Cybersecurity(we welcome other related topics)
- Personal data protection policies
- Protecting Online Identity and Reputation
- National Cybersecurity Policy, regulations, audit, and risk management
- Organizational-level information security policy, standards, procedures
- Data breach and cybersecurity litigation
- Identity and trust management
- Cybersecurity education and curriculum
- Public key infrastructures, key management, certification
- Cybersecurity and platforms including cryptography, digital forensics, blockchain, and distributed ledger technology
- Cybersecurity for IoT and blockchain applications
- Machine Learning and AI Cybersecurity Risks & Mitigations
- Security-by-design, Cybersecurity requirements in Project Management
- Hardware and physical security
- Mobile/wireless/cellular system security
- Web application (e-service, e-commerce, etc.) security
- Threat and vulnerability management, intrusion detection and response
- Online crime, underground economics
- Web, online harassment, spam, and fake news/reviews
- National Cybersecurity Awareness Program and Campaign
- Cybersecurity Audit Program, certification, practice
- Computer hacking, Digital Forensics
- Crisis management, business continuity planning
- Third-party cyber risk management
Topics in Collaboration in Cybersecurity
- Best practices for information sharing
- Building trust and collaboration
- Leveraging threat intelligence
- Effective models for PPPs
- Challenges and opportunities
- Measuring the impact of PPPs
- Global cybersecurity frameworks
- Addressing cross-border threats
- Building trust and cooperation among nations
- Building and maintaining cybersecurity communities
- Leveraging online platforms
- Measuring the impact of cybersecurity communities
- Identifying research priorities
- Funding mechanisms for collaborative research
- Sharing research outcomes
- Collaborative cybersecurity training programs
IMPORTANT DATES
6-7 Feburary 2025 |
Conference Days |
18 October 2024 |
Call for Submissions |
25 November 2024 |
Deadline for abstract, Research-in-Progress Posters, Panel Discussion Topics, and Exhibition Requests |
15 December 2024 |
Notification of acceptance or rejection of abstract, Research-in-Progress Posters, Panel Discussion Topics, Exhibition Request |
20 January 2025 |
Deadline for Full Paper, Research-in-Progress Posters, Panel Discussion Topics, and Exhibition Requests |
25 January 2025 |
Notification of acceptance or rejection of Full Paper, Posters, Panel Discussion Topics, Exhibition Request |
1 February 2025 |
Deadline for
|
Leadership Council
Berhanu Beyene |
Conference Chair |
Alemayehu Hailu |
Call for Paper Director |
Solomon Negash |
Managing Director |
Asrat Mulatu |
Conference co-Chair |
Beruh HM Tadesse |
Conference co-Chair |
Sossina Taferi |
Media Committee |
Jay Jemal |
Conference Committee |
Rahel Fidel |
Logistics Committee |
Feven Dagnachew |
Sponsorship Committee |
Seble Girma |
Program Committee |
Submit Your Proposal